we’ll take a look at BitLocker from an Active Directory point of view and look at BitLocker and TPM configuration using Group Policies and how to perform key recovery.
Disclaimer
I think it is safe to say, that BitLocker in an Active Directory based environment will probably be the most used scenario. By using BitLocker in an Active Directory based environment, you get all the security benefits from BitLocker combined with all the security, availability and scalability that comes with Active Directory.
But, before we get started, you should be aware of a few disclaimers:
Microsoft hasn’t released their BitLocker Deployment Kit yet, so unfortunately we’re unable to provide you with the official links or copies of the scripts used in this article
Also, we haven’t seen the official BitLocker deployment material that will soon be released, but the scripts we are using are provided by Microsoft. Please note however, that the names and the number of scripts covered in this article, may change when the BitLocker Deployment Kit is released
As soon as Microsoft releases the various scripts and white paper which we mention within this article, it will be updated with the respective links and so on, so that it corresponds with filenames etc. We will let you know when the article is updated through our blogs, so stay tuned!
Prerequisites
Before we get started, let us look at some prerequisites that should be satisfied, enabling you to control BitLocker from Active Directory.
You will need to extend the schema in Active Directory
If you want to control TPM recovery information from Active Directory, then you need to change the permission on the Computer class object in Active Directory
BitLocker Active Directory schema extensions are only supported on domain controllers running Windows Server 2003 with SP1 or newer, Windows Server 2003 R2 and Windows Server “Longhorn”
BitLocker is only supported to run on Windows Vista Enterprise, Windows Vista Ultimate, and Windows “Longhorn” Server
Note: While I’m writing this article, Service Pack 2 for Windows Server 2003 has hit RTM. SP2 will not include the BitLocker schema updates. You still have to the run the BitLocker schema extension script explained in this article, after you have installed SP2 on your Windows Server 2003 based setup.
Scripts that are needed
It’s time that we get started, so let us look at the files required to get BitLocker integrated with a Windows Server 2003 based Active Directory:
The following files are required so that your Windows Server 2003 based Active Directory is ready to support BitLocker.
BitLockerTPMSchemaExtension.ldf
Add-TPMSelfWriteACE.vbs
Use the files below to help verify your BitLocker configuration in Active Directory. We’ll use one of them in our example later on in this article.
List-ACEs.vbs
Get-BitLockerRecoveryInfo.vbs
Get-TPMOwnerInfo.vbs
Extend the schema in Active Directory
After you have verified the prerequisites and verified the scripts, you’re ready to extend your Active Directory so that you can store your BitLocker and TPM recovery information in Active Directory.
The way it works, is that the BitLocker recovery information is stored in a sub-object of the Computer object in Active Directory, which means that the Computer object serves as the container for one or more BitLocker recovery objects associated with a particular Computer object. The reason why I say one or more BitLocker recovery objects is because it is possible to have more than one recovery password associated with a BitLocker-enabled computer, for example if you have encrypted more than one volume on the same computer.
The name of the BitLocker recovery object has a fixed length of 63 characters that consists of the following information: